2008 16th IEEE International Conference on Networks 2008
DOI: 10.1109/icon.2008.4772567
|View full text |Cite
|
Sign up to set email alerts
|

Tree-based key management scheme for heterogeneous sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…Also, the work in [9] only mentions biased node capture attacks, while we discuss biased node capture attacks and design countermeasures against them in this paper. In [10], a key management scheme is proposed, wherein sensor nodes are organized into multiple hierarchies using a tree structure. Three types of keys are provisioned initially.…”
Section: A Rkp Based Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, the work in [9] only mentions biased node capture attacks, while we discuss biased node capture attacks and design countermeasures against them in this paper. In [10], a key management scheme is proposed, wherein sensor nodes are organized into multiple hierarchies using a tree structure. Three types of keys are provisioned initially.…”
Section: A Rkp Based Schemesmentioning
confidence: 99%
“…In our scheme, we do not use different cluster head keys, but rather use same key pools that reduces complexity during key predistribution and subsequent pair-wise set-up. Also, the scheme in [10] suffers from poor resilience under node compromises and all keys have to be refreshed very quickly. In [11], a new protocol for cluster-head selection is proposed, and ideas are proposed for key additions and revocations under network dynamics via one-way hash functions.…”
Section: A Rkp Based Schemesmentioning
confidence: 99%
“…In this approach, two communicating nodes contact their network manager or cluster head to discover a shared generation key between them for secret key generation. Node addition and revocation capability were introduced by Poornima and Amberker [28] in a tree-based key management scheme while unpredictable software-based attestation solution (USAS) is presented in [29] to detect the compromised node in the network.…”
Section: Related Workmentioning
confidence: 99%
“…A tree based key management scheme for heterogeneous sensor networks is proposed [13], which handles various events like node addition, node compromise and key refresh at regular intervals.…”
Section: Related Workmentioning
confidence: 99%